世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

エネルギークラウドのエコシステムにおけるIoT(モノのインターネット)サイバーセキュリティ脅威の管理

Managing IoT Cybersecurity Threats in the Energy Cloud Ecosystem

 

出版社 出版年月電子版価格 ページ数図表数
Navigant Research
ナビガントリサーチ
2018年2月US$1,800
1-5ユーザライセンス(PDF+Excel)
13 3

サマリー

米国調査会社ナビガントリサーチ(Navigant Research)の調査レポート「エネルギークラウドのエコシステムにおけるIoT(モノのインターネット)サイバーセキュリティ脅威の管理」は、公益事業者だけでなく企業が採用している/これから採用するIoT技術のサイバーセキュリティの脅威に関する課題を評価している。この市場に関する法規制の枠組みの一部を査定し、あまり重視されない場合が多いものの安全なIoTの履行に不可欠な基本的な戦略について考察している。利害関係者が、既に起こっているサイバー攻撃に直面するリスクを大きく削減するための具体的な手順も記載している。

Cybersecurity attacks threaten the grid, enterprises, and consumer devices on a nearly constant basis. The growing adoption of Internet of Things (IoT) devices and systems heightens this threat, giving attackers an expanding number of vectors and surfaces to target. At risk are not only valuable digital assets, private information, and corporate secrets, but also potential physical harm as the result of a cyber attack. From an enterprise perspective, Oracle Chairman Larry Ellison has said companies are losing this cyber war, adding: “Make no mistake, it’s a war.”

The situation is serious, and the urgency to act among corporations is more apparent than it was just a few years ago. Technology solution vendors report a change among corporate customers that now demand more robust security all along the value or supply chain to defend against such intrusions. These customers are aware of the security risks related to IoT projects and have made security a much higher priority. Security experts say new tools and methods are in place for detecting and preventing attacks, and the effort to stay ahead of bad actors is ongoing. On the consumer side, there is a similar need to improve security for connected home devices and services, but less urgency since the stakes vary. Nonetheless, as more people adopt IoT technologies and new threats appear, the need for stronger IoT security endures.

This Navigant Research report examines the IoT cybersecurity threats challenging not only utilities, but also other enterprises that have deployed or will be deploying IoT technologies. It examines some of the regulatory frameworks shaping this market and considers the basic strategies that often go unheeded but are necessary for a successful and secure IoT implementation. This study also offers practical steps that stakeholders should take to significantly reduce the ongoing risks they face from cyber attacks.

Key Questions Addressed:
  • What are recent examples of cybersecurity threats to Internet of Things (IoT) deployments?
  • What drivers are shaping the IoT cybersecurity market?
  • What are some of the latest tools for thwarting cybersecurity attacks aimed at IoT projects?
  • What are the common vulnerabilities and attack surfaces present in IoT settings?
  • What is the global revenue forecast for IoT cybersecurity spending over the next decade?
  • What strategies should be adopted for thwarting IoT cyber attacks?
Who needs this report?
  • Utility security managers
  • Chief security information officers (CSIOs)
  • Enterprises
  • Internet of Things (IoT) cybersecurity solution vendors
  • IoT platform vendors
  • Industry groups and alliances
  • Regulators
  • Investor community


目次

Spark

Context

Recommendations

Cyber Threats Create a Sense of Urgency

Attacks Send Wake-Up Calls

Significant Risks Drive Need for Enhanced IoT Defenses

IoT Ecosystem Needs Higher Security Standards

Significant Barriers Hamper Enhanced IoT Security

Complexity and Costs Factor into Cybersecurity Equation

Regulators Coming to Grips with IoT Device Security

Consumers Wary of IoT Intrusions, Expect Regulations

IoT Threat Awareness Evolving Even as Threats Persist

New Approaches, Tools Even the Security Fight

Chip Makers Step Up with Solutions

Multi-Tiered Defensive Stance Yields Fruit

Moving from Reactive to Proactive, Even Predictive Techniques

Recommendations

Embrace a Robust Security Strategy

Set Up a Response Plan

Train Internal Teams and All Employees, Too

Do Not Skimp on Training

Educators Recognize Need, Offer Support for Cybersecurity Instruction

Seek Partners and Suppliers with Strong Security Standards

Evolve the Strategy

List of Tables, Charts, and Figures

  • IoT Cybersecurity Revenue by Region, World Markets: 2017-2026
  • TVA’s Cybersecurity Event Process
  • IoT Vulnerabilities, Attack Surfaces

 

ページTOPに戻る

プレスリリース

[プレスリリース原文]

IoT Adoption Is Increasing the Risk of Cybersecurity Attacks Against Utilities

As IoT technologies become more popular, new threats are appearing and the need for stronger IoT security endures

March 6, 2018

A new report from Navigant Research looks at cybersecurity threats related to the Internet of Things (IoT) that pose challenges to utilities and other enterprises, providing details on regulatory frameworks and basic strategies for secure IoT implementation.

Cybersecurity attacks threaten the grid, enterprises, and consumer devices on a nearly constant basis, putting valuable digital assets, private information, and corporate secrets at risk, while also carrying the potential for physical harm. As IoT technologies become more popular, new threats are appearing and the need for stronger IoT security endures.  According to a new report from Navigant Research, growing adoption of IoT devices and systems is increasing the number of vectors and surfaces for cybersecurity attacks against utilities and other enterprises.

“The mushrooming number of IoT devices being deployed by utilities and other enterprises carries an obvious and growing security risk,” says Neil Strother, principal research analyst with Navigant Research. “Smart managers need a comprehensive strategy to stay ahead of potentially devastating threats to IoT assets. No longer can managers rely on an old-school reactive approach; instead, they and their security teams must adopt the latest proactive and predictive tools and methodologies to keep devices and systems safe.”

According to the report, the urgency to proactively prevent threats has escalated quickly in the past few years, with corporate customers demanding robust security along value and supply chains. On the consumer side, there is a similar need to improve security for connected home devices and services.

The report, Managing IoT Cybersecurity Threats in the Energy Cloud Ecosystem, examines the IoT cybersecurity threats challenging not only utilities, but also other enterprises that have deployed or will be deploying IoT technologies. It examines some of the regulatory frameworks shaping this market and considers the basic strategies that often go unheeded but are necessary for a successful and secure IoT implementation. This study also offers practical steps that stakeholders should take to significantly reduce the ongoing risks they face from cyber attacks.

 

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る